By Topic

2008 16th IEEE International Conference on Program Comprehension

10-13 June 2008

Filter Results

Displaying Results 1 - 25 of 48
  • 16th IEEE International Conference on Program Comprehension [Cover art]

    Publication Year: 2008, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (1270 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2008, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (37 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2008, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (77 KB)
    Freely Available from IEEE
  • Copyright (c) 2008 by The Institute of Electrical and Electronics Engineers, Inc. [Copyright notice]

    Publication Year: 2008, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (61 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2008, Page(s):v - viii
    Request permission for commercial reuse | PDF file iconPDF (179 KB)
    Freely Available from IEEE
  • Message from the Chairs

    Publication Year: 2008, Page(s): ix
    Request permission for commercial reuse | PDF file iconPDF (73 KB) | HTML iconHTML
    Freely Available from IEEE
  • Conference Committee

    Publication Year: 2008, Page(s): x
    Request permission for commercial reuse | PDF file iconPDF (61 KB)
    Freely Available from IEEE
  • Steering Committee

    Publication Year: 2008, Page(s): xi
    Request permission for commercial reuse | PDF file iconPDF (45 KB)
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2008, Page(s): xii
    Request permission for commercial reuse | PDF file iconPDF (52 KB)
    Freely Available from IEEE
  • Additional reviewers

    Publication Year: 2008, Page(s): xiii
    Request permission for commercial reuse | PDF file iconPDF (47 KB)
    Freely Available from IEEE
  • Scalable Program Comprehension for Analyzing Complex Defects

    Publication Year: 2008, Page(s):3 - 4
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (220 KB) | HTML iconHTML

    We describe the query-model-refine (QMR) approach for retrieving and modeling information for program comprehension. The QMR approach allows the flexibility to design and execute application-specific problem-solving strategies to suit particular program comprehension goals. The QMR approach has been used for building a number of program comprehension tools for different applications: interactive a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Reuse of Grammars with Embedded Semantic Actions

    Publication Year: 2008, Page(s):5 - 10
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (265 KB) | HTML iconHTML

    Reusing syntax specifications without embedded arbitrary semantic actions is straightforward because the semantic analysis phases of new applications can feed off trees or other intermediate structures constructed by the pre-existing parser. The presence of arbitrary embedded semantic actions, however, makes reuse difficult with existing mechanisms such as grammar inheritance and modules. This sho... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Partial Domain Comprehension in Software Evolution and Maintenance

    Publication Year: 2008, Page(s):13 - 22
    Cited by:  Papers (15)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (312 KB) | HTML iconHTML

    Partial comprehension is a necessity in the evolution and maintenance of very large software systems. The programmers form not only partial comprehension of the code, but also partial comprehension of the application domain. To describe the comprehension process, we introduce ontology fragments and investigate how programmers form, use and extend them before and during concept location; concept lo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Refining existing theories of program comprehension during maintenance for concurrent software

    Publication Year: 2008, Page(s):23 - 32
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (411 KB) | HTML iconHTML

    While the sources of complexity in the initial design and verification of multi-threaded software systems are well-documented, less is known of the issues specific to the maintenance of these systems. The literature contains a number of observational studies of programmers performing maintenance, conducted in the context of sequential software and designed to investigate the factors and behaviors ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Identifying Architectural Change Patterns in Object-Oriented Systems

    Publication Year: 2008, Page(s):33 - 42
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (465 KB) | HTML iconHTML

    As an object-oriented system evolves, its architecture tends to drift away from the original design. Knowledge of how the system has changed at coarse-grained levels is key to understanding the de facto architecture, as it helps to identify potential architectural decay and can provide guidance for further maintenance activities. However, current studies of object-oriented software changes are mos... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Toolkit for Visualizing the Runtime Behavior of TinyOS Applications

    Publication Year: 2008, Page(s):43 - 52
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (718 KB) | HTML iconHTML

    TinyOS has proven to be an effective platform for developing reactive embedded network applications. However, the platform's lean programming model and power-efficient operation come at a price: TinyOS applications are notoriously difficult to construct and debug. The development difficulties stem, in large part, from a programming model founded on events and deferred execution. In short, the mode... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CERBERUS: Tracing Requirements to Source Code Using Information Retrieval, Dynamic Analysis, and Program Analysis

    Publication Year: 2008, Page(s):53 - 62
    Cited by:  Papers (91)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (830 KB) | HTML iconHTML

    The concern location problem is to identify the source code within a program related to the features, requirements, or other concerns of the program. This problem is central to program development and maintenance. We present a new technique called prune dependency analysis that can be combined with existing techniques to dramatically improve the accuracy of concern location. We developed CERBERUS,... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Exploiting Runtime Information in the IDE

    Publication Year: 2008, Page(s):63 - 72
    Cited by:  Papers (4)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (454 KB) | HTML iconHTML

    Developers rely on the mechanisms provided by their IDE to browse and navigate a large software system. These mechanisms are usually based purely on a system's static source code. The static perspective, however, is not enough to understand an object-oriented program's behavior, in particular if implemented in a dynamic language. We propose to enhance IDEs with a program's runtime information (e.g... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Do Dynamic Object Process Graphs Support Program Understanding? - A Controlled Experiment.

    Publication Year: 2008, Page(s):73 - 82
    Cited by:  Papers (15)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (406 KB) | HTML iconHTML

    Using automatic program analysis techniques for extracting architectural information and its visualization is widely considered useful for program understanding. However, it has to be empirically validated if a given technique is beneficial in practice. This is usually done by performing a set of case studies. To find out for sure whether a technique really has any effect, controlled experiments h... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Impact of Limited Memory Resources

    Publication Year: 2008, Page(s):83 - 92
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (420 KB) | HTML iconHTML

    Since early variable mnemonics were limited to as few as six to eight characters, many early programmers abbreviated concepts in their variable names. The past thirty years has seen a steady increase in permitted name length and, slowly, an increase in the actual length of identifiers. However, in theory names can be too long. Most obviously, in object-oriented programs, names often involve chaini... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Data Model Comprehension: An Empirical Comparison of ER and UML Class Diagrams

    Publication Year: 2008, Page(s):93 - 102
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (392 KB) | HTML iconHTML

    We present the results of two controlled experiments to compare ER and UML class diagrams, in order to find out which of the models provides better support during the comprehension of data models. The experiment involved Master and Bachelor students performing comprehension tasks on data models represented by ER or UML class diagrams. The achieved results show that UML class diagrams significantly... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Traceability Technique for Specifications

    Publication Year: 2008, Page(s):103 - 112
    Cited by:  Papers (37)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (352 KB) | HTML iconHTML

    Traceability in software involves discovering links between different artifacts, and is useful for a myriad of tasks in the software life cycle. We compare several different Information Retrieval techniques for this task, across two datasets involving real-world software with the accompanying specifications and documentation. The techniques compared include dimensionality reduction methods, probab... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the Use of Domain Terms in Source Code

    Publication Year: 2008, Page(s):113 - 122
    Cited by:  Papers (25)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (341 KB) | HTML iconHTML

    Information about the problem domain of the software and the solution it implements is often embedded by developers in comments and identifiers. When using software developed by others or when are new to a project, programmers know little about how domain information is reflected in the source code. Programmers often learn about the domain from external sources such as books, articles, etc. Hence,... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Identifying Word Relations in Software: A Comparative Study of Semantic Similarity Tools

    Publication Year: 2008, Page(s):123 - 132
    Cited by:  Papers (25)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (390 KB) | HTML iconHTML

    Modern software systems are typically large and complex, making comprehension of these systems extremely difficult. Experienced programmers comprehend code by seamlessly processing synonyms and other word relations. Thus, we believe that automated comprehension and software tools can be significantly improved by leveraging word relations in software. In this paper, we perform a comparative study o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reading Beside the Lines: Indentation as a Proxy for Complexity Metric

    Publication Year: 2008, Page(s):133 - 142
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (317 KB) | HTML iconHTML

    Maintainers face the daunting task of wading through a collection of both new and old revisions, trying to ferret out revisions which warrant personal inspection. One can rank revisions by size/lines of code (LOC), but often, due to the distribution of the size of changes, revisions will be of similar size. If we can't rank revisions by LOC perhaps we can rank by Halstead's and McCabe's complexity... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.